{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:10:59Z","timestamp":1775326259964,"version":"3.50.1"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Geosci. Remote Sensing"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tgrs.2025.3565657","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T17:31:45Z","timestamp":1745947905000},"page":"1-20","source":"Crossref","is-referenced-by-count":6,"title":["DiffDual-AD: Diffusion-Based Dual-Stage Adversarial Defense Framework in Remote Sensing With Denoiser Constraint"],"prefix":"10.1109","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0809-908X","authenticated-orcid":false,"given":"Zihao","family":"Lu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, College of Electronic Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3450-8103","authenticated-orcid":false,"given":"Hao","family":"Sun","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, College of Electronic Science and Technology, National University of Defense Technology, Changsha, China"}]},{"given":"Lin","family":"Lei","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, College of Electronic Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4962-0652","authenticated-orcid":false,"given":"Yanjie","family":"Xu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, College of Electronic Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1828-0392","authenticated-orcid":false,"given":"Yuli","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Aerospace Science and Engineering, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2620-889X","authenticated-orcid":false,"given":"Gangyao","family":"Kuang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System, College of Electronic Science and Technology, National University of Defense Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3309889"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwz058"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3066485"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICARSC58346.2023.10129575"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001420540154"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2022.3140776"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2019.111322"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3235711"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3276293"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2024.01.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3274895.3274904"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3110601"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2024.3399780"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MGRS.2023.3272825"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3111024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3443403"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3051641"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.2999962"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3594869"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3328889"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2020.3003566"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10125-w"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/rs15194660"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/rs15123007"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3436841"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2021.3096244"},{"key":"ref27","first-page":"73","article-title":"Task-guided denoising network for adversarial defense of remote sensing scene classification","volume-title":"Proc. CDCEO@ IJCAI","author":"Xu"},{"key":"ref28","first-page":"12835","article-title":"Towards defending against adversarial examples via attack-invariant features","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","author":"Zhou"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3081421"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00034"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3446374"},{"key":"ref32","first-page":"5960","article-title":"Understanding generalization and optimization performance of deep CNNs","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhou"},{"key":"ref33","first-page":"11287","article-title":"Score-based generative modeling in latent space","volume-title":"Proc. NIPS","author":"Vahdat"},{"key":"ref34","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","volume-title":"Proc. NIPS","volume":"34","author":"Dhariwal"},{"key":"ref35","first-page":"51810","article-title":"Enhancing adversarial robustness via score-based optimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jag.2024.104131"},{"key":"ref37","first-page":"12062","article-title":"Adversarial purification with score-based generative models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yoon"},{"key":"ref38","first-page":"41429","article-title":"Detecting adversarial data by probing multiple perturbations using expected perturbation score","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.3005403"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869829"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2017.2685945"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3156392"},{"key":"ref43","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011639"},{"key":"ref45","article-title":"Adversarial example in remote sensing image recognition","author":"Chen","year":"2019","journal-title":"arXiv:1910.13222"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3415122"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109466"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3377009"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2021.3066802"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/rs12132098"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3208337"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3397354"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00385"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.127431"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3273287"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3397678"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3386533"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS47720.2021.9554767"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3375398"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS47720.2021.9553824"},{"key":"ref61","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. NIPS","volume":"33","author":"Ho"},{"key":"ref62","article-title":"Guided diffusion model for adversarial purification","author":"Wang","year":"2022","journal-title":"arXiv:2205.14969"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00019"},{"key":"ref64","first-page":"50062","article-title":"Diffusion models are certifiably robust classifiers","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"37","author":"Chen"},{"key":"ref65","first-page":"102255","article-title":"On the scalability of certified adversarial robustness with generated data","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"37","author":"Altstidl"},{"key":"ref66","first-page":"6316","article-title":"Learning deep kernels for non-parametric two-sample tests","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liu"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TCI.2016.2644865"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2003.1292216"},{"key":"ref69","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref70","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref71","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Croce"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref74","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"Xu","year":"2017","journal-title":"arXiv:1704.01155"},{"key":"ref75","article-title":"Characterizing adversarial subspaces using local intrinsic dimensionality","author":"Ma","year":"2018","journal-title":"arXiv:1801.02613"},{"key":"ref76","first-page":"7167","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lee"},{"key":"ref77","article-title":"Detecting adversarial samples from artifacts","author":"Feinman","year":"2017","journal-title":"arXiv:1703.00410"}],"container-title":["IEEE Transactions on Geoscience and Remote Sensing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/36\/10807682\/10980218.pdf?arnumber=10980218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:09:46Z","timestamp":1747199386000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10980218\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/tgrs.2025.3565657","relation":{},"ISSN":["0196-2892","1558-0644"],"issn-type":[{"value":"0196-2892","type":"print"},{"value":"1558-0644","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}